
CISSP Final
Quiz
•
Computers
•
Professional Development
•
Practice Problem
•
Hard
Brian OHare
Used 1+ times
FREE Resource
Student preview

50 questions
Show all answers
1.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Physical assets defined in an organization's business impact analysis (BIA) could include which of the following?
Personal belongings of organizational staff members
Disaster recovery (DR) line-item revenues
Cloud-based applications
Supplies kept off-site a remote facility
2.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
When assessing the audit capability of an application, which of the following activities is MOST important?
Identify procedures to investigate suspicious activity.
Determine if audit records contain sufficient information.
Verify if sufficient storage is allocated for audit records.
Review security plan for actions to be taken in the event of audit failure.
3.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
An organization would like to implement an authorization mechanism that would simplify the assignment of various system access permissions for many users with similar job responsibilities. Which type of authorization mechanism would be the BEST choice for the organization to implement?
Role-based access control (RBAC)
Discretionary access control (DAC)
Mandatory access control (MAC)
Attribute-based access control (ABAC)
4.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Which type of access control is abbreviated as RBAC?
Role-based access control
Discretionary access control
Content-dependent Access Control
Rule-based Access Control
5.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
What is the PRIMARY reason for criminal law being difficult to enforce when dealing with cybercrime?
Jurisdiction is hard to define.
Law enforcement agencies are understaffed.
Extradition treaties are rarely enforced.
Numerous language barriers exist.
6.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Wi-Fi Protected Access 2 (WPA2) provides users with a higher level of assurance that their data will remain protected by using which protocol?
Extensible Authentication Protocol (EAP)
Internet Protocol Security (IPsec)
Secure Sockets Layer (SSL)
Secure Shell (SSH)
7.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Which part of an operating system (OS) is responsible for providing security interfaces among the hardware, OS, and other parts of the computing system?
Reference monitor
Trusted Computing Base (TCB)
Time separation
Security kernel
Access all questions and much more by creating a free account
Create resources
Host any resource
Get auto-graded reports

Continue with Google

Continue with Email

Continue with Classlink

Continue with Clever
or continue with

Microsoft
%20(1).png)
Apple
Others
Already have an account?
Popular Resources on Wayground
5 questions
This is not a...winter edition (Drawing game)
Quiz
•
1st - 5th Grade
25 questions
Multiplication Facts
Quiz
•
5th Grade
10 questions
Identify Iconic Christmas Movie Scenes
Interactive video
•
6th - 10th Grade
20 questions
Christmas Trivia
Quiz
•
6th - 8th Grade
18 questions
Kids Christmas Trivia
Quiz
•
KG - 5th Grade
11 questions
How well do you know your Christmas Characters?
Lesson
•
3rd Grade
14 questions
Christmas Trivia
Quiz
•
5th Grade
20 questions
How the Grinch Stole Christmas
Quiz
•
5th Grade
Discover more resources for Computers
26 questions
Christmas Movie Trivia
Lesson
•
8th Grade - Professio...
25 questions
Christmas Movies
Quiz
•
Professional Development
20 questions
Christmas Trivia
Quiz
•
Professional Development
15 questions
Fun Holiday Trivia
Quiz
•
Professional Development
25 questions
Name That Tune - Christmas
Quiz
•
Professional Development
29 questions
Christmas Song Emoji Pictionary
Quiz
•
Professional Development
9 questions
Holiday Movie Trivia
Lesson
•
Professional Development
34 questions
Winter Trivia
Quiz
•
Professional Development